If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Re: Crack WPA2 - hashcat, pyrit, crunch, cowpatty, aircrack-ng

1.
[troll]
Make a hardwire connection to your router and verify the passphrase
[/troll]
You can't. You have to check either dictionary lists or a bruteforce list such
as using crunch to succeed when trying to crack .cap or .hccap file offline.
If you have a good idea of the buildup of the passphrase then you could
try to focus crunch into creating lists of a better / smaller build better suited
to the expected passphrase, rather than piping huge amounts of bruteforce data.

2.
Assuming you mean you converted a .cap file to the .hccap format for use in hashcat.
If you do not have a graphics card able to handle either CUDA (nVidia) or OpenCL (ATI) then
you dont want oclHashcat+.
You should probably also check out the hashcat-GUI version which is able to handle
both (CPU / GPU)

3.
As mentioned above, the current favourite is using reaver which can crack some WPS enabled router's
8 digit PIN number, from which you will then get the router's WPA(2) password.

Otherwise you are stuck with;
> profiling the target, and creating custom wordlists for the intended target.
> being extremely patient and going through a lot of data
> spending money on an online cracking service